Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 
Part II

Administration of Trusted Extensions

The chapters in this part describe how to administer Trusted Extensions.

Chapter 6, Trusted Extensions Administration Concepts introduces the Trusted Extensions feature.

Chapter 7, Trusted Extensions Administration Tools describes the administrative programs that are specific to Trusted Extensions.

Chapter 8, About Security Requirements on a Trusted Extensions System describes the fixed and configurable security requirements in Trusted Extensions.

Chapter 9, Common Tasks in Trusted Extensions introduces Trusted Extensions administration.

Chapter 10, About Users, Rights, and Roles in Trusted Extensions introduces role-based access control (RBAC) in Trusted Extensions.

Chapter 11, Managing Users, Rights, and Roles in Trusted Extensions provides instructions on managing regular users of Trusted Extensions.

Chapter 12, Remote Administration in Trusted Extensions provides instructions on remotely administering Trusted Extensions.

Chapter 13, Managing Zones in Trusted Extensions provides instructions on managing labeled zones.

Chapter 14, Managing and Mounting Files in Trusted Extensions provides instructions on managing mounting, backing up the system, and other file-related tasks in Trusted Extensions.

Chapter 15, Trusted Networking provides an overview of the network databases and routing in Trusted Extensions.

Chapter 16, Managing Networks in Trusted Extensions provides instructions on managing the network databases and routing in Trusted Extensions.

Chapter 17, About Trusted Extensions and LDAP describes mail-specific issues in Trusted Extensions.

Chapter 18, About Multilevel Mail in Trusted Extensions describes mail-specific issues in Trusted Extensions.

Chapter 19, Managing Labeled Printing provides instructions on handling printing in Trusted Extensions.

Chapter 20, About Devices in Trusted Extensions describes the extensions Trusted Extensions provides to device protection in Oracle Solaris.

Chapter 21, Managing Devices for Trusted Extensions provides instructions on managing devices by using the Device Manager.

Chapter 22, Trusted Extensions and Auditing provides Trusted Extensions-specific information about auditing.

Chapter 23, Software Management in Trusted Extensions describes how to administer applications on a Trusted Extensions system.